Optical Character Resolution (OCR) has been around for quite some time in the industry. Performing OCR at endpoints h
Key Benefits of Seqrite Endpoint Protection
Endpoint Detection and Response (EDR) identifies and mitigates potential threats and proactively assists in reporting such incidents following compliance standards.
End-to-end endpoint and data protection integrated into a single solution offer comprehensive security for businesses of any scale.
Provides increased scalability and heightened security across Windows and Mac platforms, with added support for Linux-based systems.
Enhances productivity and security measures with a streamlined and centralized approach to patch management.
Improved device control functionalities decrease business security risks.
Advanced security improvements fulfill enterprise compliance requirements.
Robust antivirus, intrusion detection, firewall, and more ensure thorough endpoint protection.
Identifies unforeseen vulnerabilities and minimizes unauthorized installations with proactive scans on installed applications.
Protects from malicious websites, phishing attacks, and other threats.
Cloud-based access to the dashboard for imposing policies and compliance.
Consistent asset regulation via comprehensive insights into each connected endpoint.
Features of Seqrite Endpoint Protection
Multi-Site Management
Enhances overall network control and efficiency with High Availability and Hierarchical Multi-Server Deployment, consolidating control over dispersed locations. Flexible Policy Management from the Control Center maintains consistency across endpoints, while Single Sign-On (SSO) simplifies server navigation. Centralized License Management streamlines operations by efficiently allocating and managing licenses across sites.
Application Control Safelist/Blocklist
Enforces application access restrictions following the Zero Trust methodology. Enables customization of application permissions according to the Operating System, including default OS and Seqrite applications. Provides a "Monitoring Only" mode to log application access for administrative review without blocking it.
Google and YouTube Access Controller
Restricts personal Google access while permitting corporate access based on administrator-selected account domains. Filters YouTube videos based on content categories, publisher names, and other criteria.
Enterprise File Search (EFS)
EFS is an effective way to find files that match malicious hashes across your endpoints. Based on the hashes provided by a user, EFS detects hidden attacks and helps hunt them down before they harm the system.
Automated IoC Search
Integrates with MISP server for Threat Feeds and searches MISP File Hashes periodically; the findings are published in reports.
Real-time IoC Blocking
Submit file hashes for ongoing investigation of malicious content and real-time blocking.
Migration from v7.6
Enables smooth endpoints, users, groups, and policies migration to the new Endpoint Protection Server configuration. Additionally, it supports migration in batches or groups of endpoints for added convenience.
Rapid Query to Endpoint
Retrieves endpoints in real-time to collect information from predefined data sources on the endpoints.
File Sandboxing
Integrates with Seqrite Cloud Sandbox to analyze suspicious files for malware without any additional tool for Malware Analysis.
High Availability (HA)
High Availability guarantees continuous user access to services, applications, and data, even in the event of hardware failures and software glitches, thereby reducing system downtime.
Ransomware Protection
Utilizes Seqrite's behavior-based detection technology to identify and prevent ransomware threats and backs up data in a protected location, enabling file restoration in the event of a ransomware attack.
Establishes device policies tailored to different device types on Windows and Mac platforms, ensuring network protection against unauthorized devices.
Limits web access for employees by blocking Websites individually or as per categories.
Continuously monitors hardware and software configurations of every endpoint, enabling administrators to promptly detect and respond to changes within the company's systems.
Scans for known vulnerabilities in applications and operating systems allow users to update essential security patches promptly.
A centralized patch management solution addresses all Microsoft application vulnerability patching requirements.
Prevents financial losses by protecting confidential data and mitigating the risk of business secrets leakage. Enables scanning of data-at-rest on endpoints and removable devices.
Meticulously oversees confidential company files, promptly alerting administrators to any copying, renaming, or deleting of such files.
Proactively identifies and thwarts malicious activities exploiting application vulnerabilities.
Helps Administrators meticulously define user groups based on organizational hierarchy and establish adaptable policies tailored to situational requirements.
Diligently scans endpoint inboxes for spam, phishing attacks, and unsolicited emails, bolstering defenses against email-borne threats.
If another antivirus solution is detected during the Endpoint Protection client installation, its uninstaller will be activated or automatically removed. The installation of Seqrite EPP will not proceed until the previously installed antivirus is eliminated from the system.
Safeguards endpoint clients against attacks from malicious websites accessed within the network, fortifying defenses against web-based threats.
Prevents phishing attacks originating from malicious codes over the Internet from infiltrating the network and spreading.
Monitors inbound and outbound network traffic, allowing or disallowing applications based on defined rules, enhancing network security.
Enhances endpoint performance by cleaning junk files and deleting invalid registry/disk entries within the network, optimizing system efficiency.
Helps deploy multiple update managers to achieve load balancing and prevent network congestion, ensuring seamless distribution of updates.
The cloud-based solution enables continuous endpoint management, even outside the network, allowing administrators to maintain oversight, apply policies, and ensure compliance.
Preconfigured notifications about critical network events reach appropriate parties via email or text, ensuring timely response to potential security incidents.
Compare Seqrite Endpoint Protection Products
Features | SME | Business | Total | Enterprise Suite | EDR |
---|---|---|---|---|---|
All Core Protection
(Antivirus, IDS/IPS Protection, Email Protection, Phishing Protection, Browsing Protection, SMS Notification*, Vulnerability Scan, Roaming Platform)
|
|||||
Anti Ransomware | |||||
Firewall Protection | |||||
GoDeep.AI* | |||||
Multi-Site Management | |||||
Asset Management | |||||
Spam Protection | |||||
Web Filtering | |||||
Advanced Device Control | |||||
SIEM Integration | |||||
Application Control - Blocklist | |||||
Application Control - Safelist | |||||
File Activity Monitoring | |||||
Tuneup* | |||||
Patch Management | |||||
YouTube Access Controller | |||||
Google Access Controller | |||||
Disk Encryption Management | |||||
Rapid Query to Endpoints | |||||
Automated IoC Search | |||||
Realtime IoC Search | |||||
Enterprise File Search (EFS) | |||||
Data Loss Prevention | ADD-ON | ADD-ON | |||
File Sandboxing | ADD-ON | ADD-ON | ADD-ON | ADD-ON | |
Buy Now |
Buy Now Buy Now | Buy Now Buy Now |
NA Enquire Now |
NA Enquire Now |
NA Enquire Now |
Note:
- * Feature(s) included only in v7.6
System Requirement
- v8.x
- v7.x
- Ubuntu 22.04 (supported on server as well as desktop image)
- Available Disk Space: 150 GBs or above
- Available RAM: 8 GBs or above
- Processer: 4 Core (x86-64), 2.60GHz or above
- Ubuntu 22.04 (supported on server as well as desktop image)
- Available Disk Space: 250 GBs or above
- Available RAM: 16 GBs or above
- Processer: 8 Core (x86-64), 2.60GHz or above
- Ubuntu 22.04 (supported on server as well as desktop image)
- Available Disk Space: 350 GBs or above
- Available RAM: 24 GBs or above
- Processer: 12 Core(x86-64), 2.60GHz or above
- Ubuntu 22.04 (supported on server as well as desktop image)
- Available Disk Space: 450 GBs or above
- Available RAM: 32 GBs or above
- Processer: 16 Core(x86-64),2.60GHz or above
- Ubuntu 22.04 (supported on server as well as desktop image)
- Available Disk Space: 500 GBs or above
- Available RAM: 48 GBs or above
- Processer: 24 Core(x86-64),2.60GHz or above
- Ubuntu 22.04 (supported on server as well as desktop image)
- Available Disk Space: 250 GBs or above
- Available RAM: 16 GBs or above
- Processer: 8 Core (x86-64), 2.60GHz or above
- Ubuntu 22.04 (supported on server as well as desktop image)
- Available Disk Space: 350 GBs or above
- Available RAM: 16 GBs or above
- Processer: 12 Core(x86-64), 2.60GHz or above
- Ubuntu 22.04 (supported on server as well as desktop image)
- Available Disk Space: 350 GBs or above
- Available RAM: 24 GBs or above
- Processer: 12 Core(x86-64),2.60GHz or above
- Ubuntu 22.04 (supported on server as well as desktop image)
- Available Disk Space: 250 GBs or above
- Available RAM: 16 GBs or above
- Processer: 8 Core (x86-64), 2.60GHz or above
Note: Site Server Configuration will be similar to the Standalone recommendation
Important to Know:
- SEPS client can not be installed on Windows 7 and Microsoft Windows Server 2008 R2 if these updates are not installed:
Install them by clicking on the link OR
Install Internet Explorer 11 to get the updates automatically. After installing the KB articles, you need to restart the system. - For Windows 2016, Windows Server 2019 and Server 2022, you need to uninstall Windows Defender. Post the uninstallation, make sure that you restart the system.
- Microsoft Windows 2008 Server R2 Web / Standard / Enterprise / Datacenter (64-bit)
- Microsoft Windows 7 Home Basic/ Premium / Professional / Enterprise / Ultimate (32-bit/64-bit)
- Microsoft Windows SBS 2011 Standard / Essentials
- Microsoft Windows Server 2012 R2 Standard / Datacenter (64-bit)
- Microsoft Windows Server 2012 Standard / Essentials / Foundation / Storage Server / Datacenter (64-bit)
- Microsoft Windows 8.1 Professional / Enterprise (32-bit/64-bit)
- Microsoft Windows 10 Home / Pro / Enterprise / Education (32-Bit / 64 - Bit)
- Microsoft Windows 11
- Microsoft Windows Server 2016
- Microsoft Windows Server 2019 (64-bit)
- Windows 10 November 2019 Update
- Microsoft Windows Server 2022 Standard / Datacenter / Essentials
- Processor: Intel core or Apple’s M1, M2, M3 chip compatible
- Mac OS X 10.12, 10.13, 10.14, 10.15, 11, 12, 13, 14 and 15
- GNU C Library 2.5 and later
- SAMBA version 4.12 and earlier
- Supported Distributions for Seqrite Endpoint Protection client:
- Debian 9, 10
- Ubuntu 14.04,16.04
- Boss 6.0
- Linux Mint 19.3
- GNU C Library 2.5 and later
- SAMBA version 4.16 and earlier
- Supported Distributions for Seqrite Endpoint Protection client:
- Fedora 30, 32
- Linux Mint 19.3, 20, 21.3
- Ubuntu 16.04, 18.04, 20.4, 22.04
- Debian 9, 10
- CentOS 7.8, 8.2
- RHEL 7.5, 7.8, 8.2 & 8.6 Enterprise, 9.0, 9.1, 9.2, 9.3
- SUSE Linux 12. SP4 / Enterprise Desktop 15
- Rocky Linux 8.4
- Boss 6.0, 8.0, 9.0
- Oracle Linux 7.1, 7.9 and 8.1
- Processor:
- Minimum: 1 GHz 32-bit (x86) or 64-bit (x64) processor
- Recommended: 2 GHz 32-bit (x86) or 64-bit (x64) processor
- RAM:
- Minimum: 1 GB
- Recommended: 2 GB free RAM
- Hard disk space:
- 3200 MB free space
- Web Browser:
- Internet Explorer 7 or later
- Network protocol:
- TLS 1.2
- Processor:
- Processor: Intel core or Apple’s M1, M2, M3 chip compatible
- RAM:
- Minimum: 512 MB
- Recommended: 2 GB free RAM
- Hard disk space:
- 1200 MB free space
- Processor:
- Intel or compatible
- RAM:
- Minimum: 512 MB
- Recommended: 1 GB free RAM
- Hard disk space:
- 1200 MB free space
- OS:
- Microsoft Windows 10 (64-bit) and above
- Microsoft Windows Server 2012 (64-bit) and above
- Disk Space:
- Minimum: 40 GB
- Recommended: 1 TB
- RAM:
- 8 GBs or above
- Processer:
- 4 Core(x86-64), 2.60GHz or above
Note:
- For more than 25 clients, Seqrite recommends installing Patch Management server on the Windows Server operating system.
- Physical Windows Machine with RAM >= 16 GB
- Windows 10 and above OR Windows server 2019 and above
- Disk space: 60 GB and above.
- CPU: 4 Core (x86-64) or above
- The VT-x must be enabled in the physical machine’s BIOS
- Oracle Virtual Box 7.0.8
- EPP_8.2_UBUNTU22.ova build file.
- Keep the following details ready and handy
- Product Key
- Static IP Address
- Gateway
- Subnet mask
- DNS
Note:
- For seamless working of OVA over virtual box, it is recommended to have only one hypervisor installed on the system.
- Other than the Oracle Virtual Box, ensure that no other hypervisor is installed on the system.
- OVA deployment guide: https://docs.seqrite.com/wp-content/uploads/2023/05/EPS-8.2-OVA-Deployment-Guide.pdf
- Microsoft Windows 11
- Microsoft Windows 10 Home / Pro / Enterprise / Education (32-Bit / 64 -Bit)
- Microsoft Windows 8.1 Professional / Enterprise (32-bit/64-bit)
- Microsoft Windows 8 Professional / Enterprise (32-bit/64-bit)
- Microsoft Windows 7 Home Premium / Professional / Enterprise / Ultimate (32-bit/64-bit)
- Microsoft Windows Vista Home Premium / Business / Enterprise / Ultimate (32-bit/64-bit)
- Microsoft Windows XP 32-bit SP3, 64-bit SP1 and SP2 / Professional Edition (32-bit / 64-bit)
- Microsoft Windows Server 2022 Standard / Datacenter / Essentials
- Microsoft Windows Server 2019 Standard / Datacenter / Essentials
- Microsoft Windows Server 2016 Standard / Datacenter (64-bit)
- Microsoft Windows Server 2012 R2 Standard / Datacenter (64-bit)
- Microsoft Windows MultiPoint Server 2012 Standard (64-bit)
- Microsoft Windows Server 2012 Standard / Essentials / Foundation / Storage Server / Datacenter (64-bit)
- Microsoft Windows SBS 2011 Standard / Essentials
- Microsoft Windows 2008 Server R2 Web / Standard / Enterprise / Datacenter (64-bit)
- Microsoft Windows 2008 Server Web / Standard / Enterprise (32-bit/64-bit) / Datacenter (64-bit)
- Microsoft Windows Server 2003 R2 Web / Standard / Enterprise /Datacenter
- Microsoft Windows Server 2003 Web / Standard / Enterprise (32-bit/64-bit)
Note: The following operating systems support only Master Servers without any Secondary Server,
- Microsoft Windows XP 64-bit SP1 and SP2 / Professional Edition (64-bit)
- Microsoft Windows Server 2003 Web / Standard / Enterprise (64-bit)
The computer where Seqrite Endpoint Protection server is to be installed must meet the following requirements.
- Processor:
- Minimum: 1 GHz 32-bit (x86) or 64-bit (x64) Intel Pentium
- Recommended: 2 GHz 32-bit (x86) or 64-bit (x64) Intel Pentium or higher
- RAM:
- Minimum: 2 GB
- Recommended: 4 GB or more
Seqrite Endpoint Protection server may require additional RAM as per the requirements of installed applications.
- Hard disk space:
- Minimum: 4800 MB free disk space
- Recommended: 10000 MB free disk space
- Web Browser:
- Internet Explorer 10 or 11
- Google Chrome 62, 63, 64 or 65
- Mozilla Firefox 56, 57, 58, 59, 62, 64 or 65
- Display
- 1024 x 768
Note:
-
For more than 25 clients, Seqrite recommends installing Seqrite Endpoint Protection Server and Patch Management server on the Windows Server operating system
-
For more than 500 clients, Seqrite recommends a dedicated Web server (IIS).
-
Seqrite recommends deploying a separate/dedicated Alternate Update manager for a group of up to 200 clients for proper load balancing.
Java Runtime Environment (JRE) required to perform installation through Web page and Add Device functionalities are as follows:
- 32-bit
- 32-bit JRE 7, 32-bit JRE 8
- 64-bit
- 32-bit JRE 7, 32-bit JRE 8
- 64-bit JRE 7, 64-bit JRE 8
Seqrite Endpoint Protection server needs to have Microsoft IIS Web server as well as Microsoft .NET Framework 4.0 on your computer system.
- IIS Version 10 on Windows 10
- IIS Version 8.5 on Windows 8.1 and Windows Server 2012 R2
- IIS Version 8.0 on Windows 8 and Windows Server 2012
- IIS Version 7.6 on Windows 7 and Windows Server 2008 R2
- IIS Version 7.0 on Windows Vista and Windows Server 2008
- IIS Version 6.0 on Windows Server 2003
- IIS Version 5.1 on Windows XP SP3
Note: The Seqrite Endpoint Protection installer will install required IIS Components.
Seqrite Endpoint Protection client can be installed on a computer system with any one of the following operating systems:
- Microsoft Windows 11
- Microsoft Windows 10 Home / Pro / Enterprise / Education (32-Bit / 64 -Bit)
- Microsoft Windows 8.1 Professional / Enterprise (32-bit/64-bit)
- Microsoft Windows 8 Professional / Enterprise (32-bit/64-bit)
- Microsoft Windows 7 Home Basic/ Premium / Professional / Enterprise / Ultimate (32-bit/64-bit)
- Microsoft Windows Vista Home Basic/ Premium / Business / Enterprise / Ultimate (32-bit/64-bit)
- Microsoft Windows XP Home (32-bit) / Professional Edition (32-bit / 64-bit)
- Microsoft Windows Server 2022 Standard / Datacenter / Essentials
- Microsoft Windows Server 2019 Standard / Datacenter / Essentials
- Microsoft Windows Server 2016 Standard / Datacenter (64-bit)
- Microsoft Windows Server 2012 R2 Standard / Datacenter (64-bit)
- Microsoft Windows MultiPoint Server 2012 Standard (64-bit)
- Microsoft Windows Server 2012 Standard / Essentials / Foundation / Storage Server / Datacenter (64-bit)
- Microsoft Windows SBS 2011 Standard / Essentials
- Microsoft Windows 2008 Server R2 Web / Standard / Enterprise / Datacenter (64-bit)
- Microsoft Windows 2008 Server Web / Standard / Enterprise (32-bit/64-bit) / Datacenter (64-bit)
- Microsoft Windows Server 2003 R2 Web / Standard / Enterprise /Datacenter
- Microsoft Windows Server 2003 Web / Standard / Enterprise (32-bit/64-bit)
Note:
- For Windows 2016 Server and Windows 2019 Server, uninstall Windows Defender before installing Seqrite Endpoint Protection client.
- If you are upgrading the Seqrite Endpoint Protection client to Windows 2016 Server or Windows 2019 Server, uninstall Windows Defender after upgrade.
The computer where Seqrite Endpoint Protection client is to be installed must meet the following requirements.
- Processor:
- Minimum: 1 GHz 32-bit (x86) or 64-bit (x64) processor for Windows Vista
- Recommended: 2 GHz 32-bit (x86) or 64-bit (x64) processor for Windows Vista or higher
- RAM:
- Minimum: 1 GB
- Recommended: 2 GB or more
- Hard disk space:
- 3200 MB
- Web Browser:
- Internet Explorer 5.5 or later
Software and hardware requirements for Seqrite Endpoint Protection clients on Mac OS are as follows.
- MAC OS:
- Mac OS X 10.12, 10.13, 10.14, 10.15, 11, 12, 13, 14 and 15
- Processor:
- Intel core or Apple’s M1, M2, M3 chip compatible
- RAM:
- Minimum: 512 MB
- Recommended: 2 GB or more
- Hard disk space:
- 1200 MB
Software and hardware requirements for Seqrite Endpoint Protection clients on Linux OS are as follows:
- 32-bit:
- RHEL 6.1, 6.2, 6.3, 6.4, 6.5, 6.6, 6.7, 6.8, 6.9
- BOSS 6
- Fedora 14, 18, 19, 20, 21, 22, 23, 24, 25
- openSUSE 11.4, 12.2, 12.3, 13.2, 42.2
- Linux Mint 13, 14, 15, 16, 17.3, 18
- Ubuntu 10.10, 11.4, 12.04 LTS, 12.04.3 LTS, 13.04, 13.10, 14.04, 14.10, 15.04, 16.04 LTS, 16.10, 17.04
- CentOS 6.3, 6.4, 6.5, 6.6, 6.7, 6.8, 6.9
- 64-bit:
- RHEL 6.1, 6.2, 6.3, 6.4, 6.5, 6.6, 6.7, 6.8, 6.9, 7.0, 7.1, 7.2, 7.3
- Boss: 7.0, 8.0
- Fedora 14, 18, 19, 20, 21, 22, 23, 24, 25
- openSUSE 11.4, 12.2, 12.3, 42.3
- Linux Mint 13, 14, 15, 16, 17.3, 18
- Ubuntu 10.10, 11.4, 12.04.2 LTS, 13.04, 13.10, 14.04, 14.10, 15.04, 16.04 LTS, 16.10, 17.04, 17.10, 18.04, 20.04 LTS
- CentOS 6.3, 6.4, 6.5, 6.6, 6.7, 6.8, 6.9, 7.0, 7.4, 8.0, 8.1
- SUSE Linux 11.00, 12.00, 12.2
- Processor:
- Intel core compatible
- RAM:
- Minimum: 512 MB
- Recommended: 1 GB or more
- Hard disk space:
- 1200 MB
The Seqrite Endpoint Protection client supports the above-mentioned distribution. The clients also support the other versions if the following prerequisites are met,
-
GNU C Library 2.11 and above
-
SAMBA version 3.5.x to 4.5.x, 4.10.x, 4.11.x.
-
GNU C Library 2.5 and above
-
SAMBA version 3.5.x to 4.5.x, 4.10.x, 4.11.x.
In case of the clients with other than above mentioned Linux operating system, Seqrite recommends to validate the clients in a non-production environment before deploying in the production environment.
Experience the best-in-class solutions offered by Seqrite and how they can address the security challenges of your enterprise. Explore our key features and capabilities with a demo.
Request a DemoOur experts are available 24 by 7 to answer any query you may have. From basic questions like, “what is endpoint protection,” to advanced questions on its features and applications, they will help you with everything.
Contact Now